SlideShare a Scribd company logo
A PRESENTATION ON
the SECURITY
FEATURE OF ATM
ABOUT THE ATM (automated
teller machine)
 An ATM is an electronic device which allows a
bank’s customer to make cash withdrawals
and check their account balance at any time
without the need for a human teller.
 Many ATMs also allow to deposit cash or
checques, and to transfer money between
their bank accounts.
PARTS OF THE ATM SYSTEM:
1. Card Reader
2. Keypad
3. Speaker
4. Display Screen
5. Receipt Printer
6. Cash dispenser
7. Deposit slot
8. Screen buttons
HOW ATM WORKS:
 The ATM acts as a data terminal. ATM has
to connect to or communicate through a host
computer.
 The host computer is analogous to an
Internet Service Provider(ISP).
 The host computer is the gateway through
which all the various ATMs become available
Contd..
 In an ATM system customers authenticate
themselves by using a plastic card with a
magnetic stripe which is known as “ATM CARD”.
 The magnetic stripe encodes the customers
account number and a numeric password which is
known as “PIN” (Personal Identification Number).
 The ATM prompts the user to insert the card.
 When the card is entered the customer’s PIN is
requested.
Contd..
 The customer inputs his or her PIN.
 If the card is a valid card which can be processed by
the machine then it prompts the user to either
transfer, deposit or withdraw cash.
 If the number is entered incorrectly several times in
a row most ATMs will retain the card as a security
precaution to prevent an unauthorized user.
 ATM needs and stores customer’s data on a smart
card.
NETWORKING CONCEPT:
 ATMs rely on authorization of a
financial transaction by the card issuer or
other authorizing institution
via the communications network.
 Most host computers can support either
leased-line or dial-up machines.
 Leased-line machines connect directly to the
host computer through a four-wire, point-to-
point dedicated telephone line.
Contd..
 Dial-up ATMs connect the host computer
through a normal phone line using a modem.
 The host computer may be owned by a bank
or any financial institutions or it may be used
by an independent service provider.
Hardware and Software:
 An ATM contains secure crypto-
processors, generally within an IBM PC
compatible host computer in a secure
enclosure.
 The security of the machine relies mostly on
the integrity of the secure crypto-processor.
 A crypto-processor is a type of processor
which processes encrypted data.
Contd..
 ATM typically connects directly to their ATM
transaction processor via a modem over a
dedicated telephone line.
 ATM machines runs with operating systems
such as Windows 2000 and Linux.
 ATM transactions are usually encrypted with
DES.
 Most ATM are connected to inter-bank
network.
GENERAL SECURITY:
 Modern ATM’s physical security concentrate on
denying the use of the money inside the machine
to a thief or a fraud using some fraud detection
techniques.
 Another trend in ATM security is the fortified
cash dispenser which is replaced with nothing
more than a paper-tape printer.
 The customer requests a withdrawal from the
machine which dispenses no money but merely
prints a receipt. The customer then takes the
receipt to the sales clerk and then exchange it
for cash.
Contd..
 Some ATM system provides the security that if
you withdraw certain amount per day or you
deposit, a prompt on the screen will ask you to
enter your birthday and month to confirm your
identity.
 By ensuring that you are the real card holder it
can reduce the risks of the frauds.
 An additional security measure limits the total
amount of the ATM withdrawal to some
particular amount.
 This aims to reduce the amount of fraud
withdrawal.
SECURITY FEATURE:
To provide security, ATM systems follows three
different mechanisms:
Time-out
Invalid card
Stolen card
• Time out: The customer may fail to enter the PIN
within the allowed time limit then the card is
returned.
• Invalid card: The card is not recognized and is
returned.
• Stolen card: The card is recognized as a stolen
card and is retained by the machine.
DATABASE SECURITY:
 The ATM keeps all the information about the
user and the user’s account inside the
centralized database. Inside the database all
the information are stored in the form of
tables(objects) which are more secure than
the general file systems.
 The database also provide locking mechanisms
to maintain safety and security of data.
NETWORK SECURITY:
The ATM network system provides the following
features:
 Authentication: The user is the one it claims to
be.
 Confidentiality: Only authorized users can access
the content of the data.
 Integrity: The data is not to be altered by the
third party during the transmission.
Contd..
 Non-repudiation(refuse to access): A user
cant deny the fact that it has accessed a
service or data.
ADDITIONAL FEATURES:
 Verifications of identity: Security system is
able to establish and verify the claimed
identity of any actor in an ATM network.
 Protection of confidentiality: Stored and
communicated data are confidential.
Contd..
 Strong accountability: The entity can’t deny
the responsibility of its performed action as
well as their effects.
 Alarm reporting: The security system is able
to generate alarm notification about certain
selected security related events.
 Audit: When violations of security happens
the system is able to analyze the data
relevant to security.
Contd..
 Security recovery:
The security system is able to recover from
successful or attempted failures of security.
PRECAUTIONS TO TAKE:
 Treat your ATM card like cash. Always keep
your card in a safe place.
 Keep your secret code as a secret. Don’t use
date of birth, address, phone number as your
PIN.
 Take your receipt on every ATM transactions.
Don’t leave it or near the ATM counter.
 Report a lost or stolen card at once.
 ATM user should seek out a machine that is
located in a well-lighted area.
THANK YOU

More Related Content

What's hot

Atm
AtmAtm
Ppt final
Ppt finalPpt final
Ppt final
dikshagupta111
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
Chand Pasha
 
Atm security
Atm securityAtm security
Atm security
Pushkar Dutt
 
Smart card
Smart cardSmart card
Smart card
Santosh Khadsare
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
Pavani839789
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
john juvvanapudi
 
Security
SecuritySecurity
Security
AyushiGupta3123
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
Radhika Venkat
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
Vinayak Hegde
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
Chaitanya Ram
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
Prabhat Singh
 

What's hot (20)

Atm
AtmAtm
Atm
 
Ppt final
Ppt finalPpt final
Ppt final
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Atm security
Atm securityAtm security
Atm security
 
Smart card
Smart cardSmart card
Smart card
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Security
SecuritySecurity
Security
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 

Viewers also liked

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
seanraz
 
Atm System
Atm SystemAtm System
Atm System
Nila Kamal Nayak
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
Networking
 
ATM Banking
ATM BankingATM Banking
ATM Banking
Arnav Sameer
 
Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)
Ruksin Sangrugee
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
Tushar Ranjan
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
khurda
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
worldstuff
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirements
wajahat Gul
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
JOLLUSUDARSHANREDDY
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
mahesh123slideshre
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Agreeta Sharma
 
Manish (passive optic network)
Manish (passive optic network)Manish (passive optic network)
Manish (passive optic network)
Manish Desai
 

Viewers also liked (18)

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Atm System
Atm SystemAtm System
Atm System
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 
ATM BANKING
ATM BANKINGATM BANKING
ATM BANKING
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirements
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
Manish (passive optic network)
Manish (passive optic network)Manish (passive optic network)
Manish (passive optic network)
 

Similar to Presentation on security feature of atm (2)

13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
Prashantmittal33
 
Presentation On ATM Technology
Presentation On ATM TechnologyPresentation On ATM Technology
Presentation On ATM Technology
VINOD KUMAR RAMKUMAR
 
13828523.ppt
13828523.ppt13828523.ppt
13828523.ppt
Prashantmittal33
 
ATM Security
ATM SecurityATM Security
ATM Security
Roushan Jha
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
Mohd. Ahmad Siddiqi
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
Jia
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
KanchanRaut13
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
Vidya Sagar
 
E010313141
E010313141E010313141
E010313141
IOSR Journals
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital Banking
AbinayaS31
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
ShujaShah
 
Moneypad
MoneypadMoneypad
Moneypad
ankur bhalla
 
ATM .pptx
ATM .pptxATM .pptx
ATM .pptx
sumit payal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
 

Similar to Presentation on security feature of atm (2) (20)

13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
What is ATM
What is ATMWhat is ATM
What is ATM
 
Presentation On ATM Technology
Presentation On ATM TechnologyPresentation On ATM Technology
Presentation On ATM Technology
 
13828523.ppt
13828523.ppt13828523.ppt
13828523.ppt
 
ATM Security
ATM SecurityATM Security
ATM Security
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
E010313141
E010313141E010313141
E010313141
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital Banking
 
Atm machine
Atm machineAtm machine
Atm machine
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Moneypad
MoneypadMoneypad
Moneypad
 
ATM .pptx
ATM .pptxATM .pptx
ATM .pptx
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 

More from Siya Agarwal

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketing
Siya Agarwal
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentia
Siya Agarwal
 
Anode filter bags
Anode filter bagsAnode filter bags
Anode filter bags
Siya Agarwal
 
Pmp west delhi
Pmp west delhiPmp west delhi
Pmp west delhi
Siya Agarwal
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting system
Siya Agarwal
 
Solar off grid
Solar off gridSolar off grid
Solar off grid
Siya Agarwal
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controller
Siya Agarwal
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturi
Siya Agarwal
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bag
Siya Agarwal
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening mesh
Siya Agarwal
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bag
Siya Agarwal
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeve
Siya Agarwal
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filter
Siya Agarwal
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bag
Siya Agarwal
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextile
Siya Agarwal
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuser
Siya Agarwal
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bags
Siya Agarwal
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bag
Siya Agarwal
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuser
Siya Agarwal
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cages
Siya Agarwal
 

More from Siya Agarwal (20)

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketing
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentia
 
Anode filter bags
Anode filter bagsAnode filter bags
Anode filter bags
 
Pmp west delhi
Pmp west delhiPmp west delhi
Pmp west delhi
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting system
 
Solar off grid
Solar off gridSolar off grid
Solar off grid
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controller
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturi
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bag
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening mesh
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bag
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeve
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filter
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bag
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextile
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuser
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bags
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bag
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuser
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cages
 

Recently uploaded

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 

Recently uploaded (20)

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 

Presentation on security feature of atm (2)

  • 1. A PRESENTATION ON the SECURITY FEATURE OF ATM
  • 2. ABOUT THE ATM (automated teller machine)  An ATM is an electronic device which allows a bank’s customer to make cash withdrawals and check their account balance at any time without the need for a human teller.  Many ATMs also allow to deposit cash or checques, and to transfer money between their bank accounts.
  • 3. PARTS OF THE ATM SYSTEM: 1. Card Reader 2. Keypad 3. Speaker 4. Display Screen 5. Receipt Printer 6. Cash dispenser 7. Deposit slot 8. Screen buttons
  • 4. HOW ATM WORKS:  The ATM acts as a data terminal. ATM has to connect to or communicate through a host computer.  The host computer is analogous to an Internet Service Provider(ISP).  The host computer is the gateway through which all the various ATMs become available
  • 5. Contd..  In an ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as “ATM CARD”.  The magnetic stripe encodes the customers account number and a numeric password which is known as “PIN” (Personal Identification Number).  The ATM prompts the user to insert the card.  When the card is entered the customer’s PIN is requested.
  • 6. Contd..  The customer inputs his or her PIN.  If the card is a valid card which can be processed by the machine then it prompts the user to either transfer, deposit or withdraw cash.  If the number is entered incorrectly several times in a row most ATMs will retain the card as a security precaution to prevent an unauthorized user.  ATM needs and stores customer’s data on a smart card.
  • 7. NETWORKING CONCEPT:  ATMs rely on authorization of a financial transaction by the card issuer or other authorizing institution via the communications network.  Most host computers can support either leased-line or dial-up machines.  Leased-line machines connect directly to the host computer through a four-wire, point-to- point dedicated telephone line.
  • 8. Contd..  Dial-up ATMs connect the host computer through a normal phone line using a modem.  The host computer may be owned by a bank or any financial institutions or it may be used by an independent service provider.
  • 9. Hardware and Software:  An ATM contains secure crypto- processors, generally within an IBM PC compatible host computer in a secure enclosure.  The security of the machine relies mostly on the integrity of the secure crypto-processor.  A crypto-processor is a type of processor which processes encrypted data.
  • 10. Contd..  ATM typically connects directly to their ATM transaction processor via a modem over a dedicated telephone line.  ATM machines runs with operating systems such as Windows 2000 and Linux.  ATM transactions are usually encrypted with DES.  Most ATM are connected to inter-bank network.
  • 11. GENERAL SECURITY:  Modern ATM’s physical security concentrate on denying the use of the money inside the machine to a thief or a fraud using some fraud detection techniques.  Another trend in ATM security is the fortified cash dispenser which is replaced with nothing more than a paper-tape printer.  The customer requests a withdrawal from the machine which dispenses no money but merely prints a receipt. The customer then takes the receipt to the sales clerk and then exchange it for cash.
  • 12. Contd..  Some ATM system provides the security that if you withdraw certain amount per day or you deposit, a prompt on the screen will ask you to enter your birthday and month to confirm your identity.  By ensuring that you are the real card holder it can reduce the risks of the frauds.  An additional security measure limits the total amount of the ATM withdrawal to some particular amount.  This aims to reduce the amount of fraud withdrawal.
  • 13. SECURITY FEATURE: To provide security, ATM systems follows three different mechanisms: Time-out Invalid card Stolen card • Time out: The customer may fail to enter the PIN within the allowed time limit then the card is returned. • Invalid card: The card is not recognized and is returned. • Stolen card: The card is recognized as a stolen card and is retained by the machine.
  • 14. DATABASE SECURITY:  The ATM keeps all the information about the user and the user’s account inside the centralized database. Inside the database all the information are stored in the form of tables(objects) which are more secure than the general file systems.  The database also provide locking mechanisms to maintain safety and security of data.
  • 15. NETWORK SECURITY: The ATM network system provides the following features:  Authentication: The user is the one it claims to be.  Confidentiality: Only authorized users can access the content of the data.  Integrity: The data is not to be altered by the third party during the transmission.
  • 16. Contd..  Non-repudiation(refuse to access): A user cant deny the fact that it has accessed a service or data. ADDITIONAL FEATURES:  Verifications of identity: Security system is able to establish and verify the claimed identity of any actor in an ATM network.  Protection of confidentiality: Stored and communicated data are confidential.
  • 17. Contd..  Strong accountability: The entity can’t deny the responsibility of its performed action as well as their effects.  Alarm reporting: The security system is able to generate alarm notification about certain selected security related events.  Audit: When violations of security happens the system is able to analyze the data relevant to security.
  • 18. Contd..  Security recovery: The security system is able to recover from successful or attempted failures of security.
  • 19. PRECAUTIONS TO TAKE:  Treat your ATM card like cash. Always keep your card in a safe place.  Keep your secret code as a secret. Don’t use date of birth, address, phone number as your PIN.  Take your receipt on every ATM transactions. Don’t leave it or near the ATM counter.  Report a lost or stolen card at once.  ATM user should seek out a machine that is located in a well-lighted area.